Articles in Category: Managing Email
Articles discussing how to manage email – from creating accounts, filing messages, and just generally using email effectively.
It can be surprisingly hard to tell if an email account has been hacked, especially when hackers cover their tracks. I’ll show you a couple of possible signs.
It can be a challenge to delete multiple emails. I’ll look at some of the concepts and techniques used by various email programs to make it easier.
Emailing attachments — particularly large files — is getting more and more difficult as ISPs limit size and scan for malware.
Changing an email address involves changing more than just the address. I’ll look at common scenarios and a few additional approaches.
There are many reasons pictures don’t show up in email. I’ll review the complex world that is email, and some of the things that can go wrong.
The rule is, never click on links unless you are 100% certain that they are from who you think they are. The question is, how can you be certain?
When replying to email, many programs include the original text with some indication that it is the original. We’ll look at configuring that.
A closed email account is either waiting for you to reactivate it, or is closed for good. The only way to tell is to try.
Occasionally, you’re asked to enter the email address you want to unsubscribe. With today’s technology, there’s no excuse for that.
People often send email to the wrong address by mistake. But what happens if the email address is invalid?
It’s no fun to write a long email and lose it. Here’s how that happens and a few ways to avoid it.
Once you hit that Send button, assume there is no way to stop your email from being sent … even if it’s to the wrong person.
While there are settings and services that claim to know if an email has been opened, they are notoriously unreliable and pointless.
“Mailbox unavailable” is a common email bounce message that actually says very little. I’ll review some of the more common causes of “mailbox unavailable”.
When your email program starts repeatedly asking you for your password, it’s a sign of a problem. Most of the time, it’s a simple problem.
Out-of-office replies can ricochet through email lists like spam and even put you in harm’s way. Are they evil?
The default mail program is used to send email at the request of other programs on your computer or links on web page. If you use a web interface, however, things get tricky.
Using a desktop email program to back up your email is a very good way to avoid potential data loss. I’ll show you how to backup your email easily, using Outlook.com and Thunderbird as my examples.
When an email message comes back to you because of a problem, exactly who did or did not get the message depends on the error and where it happened.
Email can use complex methods to encode special (or even not-so-special) characters. Occasionally, those methods accidentally become visible.
Outlook.com accounts are hacked into and lost every day. I’ll review a couple of techniques that ensure you won’t lose email or contacts if it happens to you.
POP, POP3, and SMTP are all acronyms used in configuring email. We’ll look at what they mean and how they relate.
Want an email address that won’t have to change for a long time? There’s really only one approach that’s completely in your control.
Edit a reply before sending it: clean up your message, remove email addresses, and more.
Signatures are a great way to make composing email easier by including standard information at the bottom. I’ll show you where the settings are in three popular email interfaces.
Simply emailing your entire contact list with a notice that you’ve changed your email address is NOT the way to change your email address.
If you send email to an invalid address or a closed account, usually you’ll get a bounce back. Usually. But you cannot count on bounces.
It’s important to check in and possibly download your email from time to time so that you won’t lose email, or perhaps the entire account.
Being over quota means you’ve received or kept too much email. Dealing with an email quota requires understanding just where that email is being kept.
Delays happen for many reasons; it’s the nature of the email infrastructure. If you get a “Delivery Status Notification (Delay)”, your options are limited.
Email usually works, but it can fail to arrive for a number of reasons. Being blocked is only one, and it’s nearly impossible to tell which has happened.
Computers use email addresses to route email. Angle brackets are used when a more human-readable name is also included.
Email comes with its own set of somewhat confusing terminology. I’ll review the differences between an email address, email account, and email domain.
IMAP is a protocol that your email program may use to access your email. Among other features, it makes dealing with email on multiple devices much easier.
Depending on what email program or service you use, deleted emails may or may not be really deleted. It’s surprisingly hard to tell for certain.
When adding another device to access your email, it’s easy to run into a situation where email seems to disappear. I’ll look at the most common reason and what to do about it.
Relying on free email services can be an unnecessary risk. Fortunately it’s possible, even easy, to back up Gmail.
It can be extremely difficult to find the email address of someone you want to contact. To begin with, they must want to be found.
Registering your own domain is one way to keep an email address that you’ll never need to change. I’ll look at some of the issues in choosing a domain name, and choosing a registrar.
It can be unnerving to get email for someone else – that clearly isn’t spam – which appears to have been sent to your email address. If that person is in another country, look closer.
This sounds like a problem in your friend’s contact list or address book. To sort it out, first we need to understand where email names come from.
At first blush the new policies look like a good thing… until they start hitting email discussion groups and creating all sorts of havoc! Bottom line: blame spammers.
You have control over what recipients see in the “from” field when they receive email from you. But the “to” field when you’re receiving a message? Not so much.
If your email service is on a blacklist it’s going to be pretty hard to get it removed. Let’s try a work-around and see if that helps.
There is an easy solution, and a not-so-easy solution. It’s going to depend on how much money you want to spend.
This is all about the many ways your computer tries to make your life easier. Sometimes it tries just a little too hard. The solution is fairly simple, but may be in one of several places.
You’re not a spammer, I know that – but you’re acting like a spammer. And there’s your problem.
Often images are used by newsletter providers to track how often emails are read. Yes it’s tracking… but is it something you need to worry about?
One of the problems with Outlook Express is difficulty in exporting data. Your best bet is to find a more recent software to help with the migration.
There are various options to access one email account from multiple computers, and there are pros and cons to each.